Protocol based detection of suspicious network traffic

a network traffic and protocol technology, applied in the field of network security, can solve the problems of increasing malware volume, requiring prolonged operation, and botnets and apts becoming significant threats to personal and corporate security

Active Publication Date: 2016-12-29
FORTINET
View PDF4 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0009]Embodiments of the present invention relate to identification of suspicious network traffic indicative of the existence of a Botnet and / or an Advanced Persistent Threat (APT). According to one embodiment, a traffic file is received at a network security device that is protecting a private network. The traffic file contains therein network traffic associated with the private network that has been captured and stored. The received traffic file is processed by the network security device to determine whether the network traffic relates to a network protocol that is indicative of existence of a network security threat within the private network. When existence of the network security threat is detected, then the network security device reports details regarding the network security threat.

Problems solved by technology

APTs are generally slow, deliberate, and secret in action or character and hence require a prolonged duration of operation in order to be successful.
Both botnets and APTs have now become significant threats to personal and corporate security.
There is an ever growing volume of malware, making it challenging for Anti Virus (AV) engines to detect them within a reasonable time.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protocol based detection of suspicious network traffic
  • Protocol based detection of suspicious network traffic
  • Protocol based detection of suspicious network traffic

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020]Methods and systems are described for accurately and efficiently detecting botnets and APTs. In the following description, numerous specific details are set forth in order to provide a thorough understanding of embodiments of the present disclosure. It will be apparent to one skilled in the art that embodiments of the present disclosure may be practiced without some of these specific details.

[0021]Embodiments of the present disclosure include various steps, which will be described below. The steps may be performed by hardware components or may be embodied in machine-executable instructions, which may be used to cause a general-purpose or special-purpose processor programmed with the instructions to perform the steps. Alternatively, steps may be performed by a combination of hardware, software, firmware and / or by human operators.

[0022]Embodiments of the present disclosure may be provided as a computer program product, which may include a machine-readable storage medium tangibly...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the present invention relate to identification of suspicious network traffic indicative of a Botnet and/or an Advanced Persistent Threat (APT) based on network protocol of such traffic. According to one embodiment, a traffic file is received at a network security device that is protecting a private network. The traffic file contains therein network traffic associated with the private network that has been captured and stored. The received traffic file is processed by the network security device to determine whether the network traffic relates to a network protocol that is indicative of existence of a network security threat within the private network. When existence of the network security threat is detected, then the network security device reports details regarding the network security threat.

Description

COPYRIGHT NOTICE[0001]Contained herein is material that is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction of the patent disclosure by any person as it appears in the Patent and Trademark Office patent files or records, but otherwise reserves all rights to the copyright whatsoever. Copyright © 2015, Fortinet, Inc.BACKGROUND[0002]Field[0003]Embodiments of the present invention generally relate to the field of network security. More particularly, embodiments of the present invention relate to identification of suspicious network traffic indicative of a Botnet and / or an Advanced Persistent Threat (APT) based on characteristics of the traffic (e.g., the protocol used, the source or destination port and / or the source or destination address).[0004]Description of the Related Art[0005]Existing web-based applications / solutions allow users to visit a website using a variety of web browsers, e.g., Internet Explorer, Mozilla Firefox, Google Ch...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L29/06
CPCH04L63/145H04L63/1466H04L63/1408H04L63/1458
Inventor ZHANG, JIEXU, HE
Owner FORTINET
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products